Traceable – Weblog: Traceable + Wiz: Supercharging Menace Detection with Full Cloud and API Context

In terms of understanding utility danger and detecting refined threats concentrating on functions, context is king. Traceable is purpose-built to supply essentially the most full safety context on APIs by capturing, correlating, and analyzing each API transaction. By partnering with Wiz, we additional prolong our knowledge benefit with cloud safety context, powering higher-fidelity risk detection and danger primarily based prioritization for cloud native functions. We introduced the primary section of our integration final 12 months, bringing Wiz knowledge into Traceable, and are excited to announce a brand new section that pushes Traceable’s API safety context into the Wiz platform.

Part 1: Wiz Cloud Context in Traceable

Traceable AI has been one of many early expertise companions with Wiz for the WIN program, offering prospects with the mixed capabilities of the Wiz Cloud Native Software Safety Platform (CNAPP) and Traceable’s API Safety Platform. The primary section of the combination helped our joint prospects obtain the next objectives:

  1. Full Code to Cloud Menace Correlation: Correlate API threats recognized by Traceable with cloud context round Kubernetes and VM deployments from Wiz
  2. Forestall Information Loss at API layer: Information loss mapping with cloud context to guard delicate knowledge throughout API Request/Response and cloud storage layers
  3. Scale simply and securely: Automated mapping of APIs to cloud deployments  by Traceable to find out the place compromised cloud property reside.

Part 2: Bi-directional Integration Brings Traceable API Context into Wiz

The subsequent section of the combination takes full risk correlation to the following stage with the power to push Traceable risk detections into Wiz Cloud occasions and the highly effective Wiz Safety graph. This fully adjustments the best way APIs may be protected with cloud context and risk correlation is feasible in a single console throughout the Wiz platform. Since most trendy APIs are deployed within the public cloud as we speak, the important thing container and VM stage correlation is achieved with the capabilities of the eBPF expertise that Traceable invested in early.Key options and advantages for our joint prospects with this expanded integration embody:Correlate real-time API threats from Traceable with Wiz Points for deeper context and streamlined investigationWiz identifies and prioritizes Points in cloud environments primarily based on a number of danger and risk elements. Traceable leverages Wiz Points to supply Safety groups with cloud infrastructure context when remediating an lively risk detected on their APIs. Pushing API runtime risk detections to Wiz helps enrich Wiz’s risk detection capabilities and contribute as proof to Wiz Points. These are particularly helpful for privilege escalation, injection assaults and arbitrary code execution primarily based exploits like Log4 Shell and Spring4 Shell.

667fa6c600741aee889006c8 image4

Prioritize API vulnerabilities primarily based on probability of exploitationWiz scans cloud environments and creates a whole stock of cloud property, interdependencies, and dangers related to these property. Traceable helps deployment modes like eBPF which has underlying cloud property particulars that allow it to question Wiz’s API to tug stock, API misconfigurations, and points. Correlating these insights with threats seen on the APIs offers infosec groups with particulars on assault paths due for particular person or mixed dangers. Visualize assaults on Wiz Safety Graph for Incident ResponseWhen a safety incident happens, it is crucial that Incident Response groups have the ability to rapidly and precisely assess the potential impression of a compromised useful resource akin to a VM or container and pinpoint the foundation explanation for how the safety breach occurred. Wiz’s key improvements on this space are complemented with Traceable’s inherent capabilities round actual time risk detection for unparalleled poisonous mixture evaluation.

667fa6c600741aee889006bf image2

Forensics and Root Trigger Evaluation Pinpointing the foundation explanation for a safety incident in complicated cloud deployments which span VMs, containers, serverless, and so on. may be like discovering a needle in a haystack. For Kubernetes Namespaces, Wiz has open-sourced the blast radius calculation methodology and launched NamespaceHound to detect violations, Traceable’s platform has full protection for risk detections starting from AuthN/AuthZ primarily based assaults to privilege escalation to path manipulation primarily based assaults. That correlated with behavioral baselines permits for full risk searching and forensics which enhances Wiz’s capabilities properly.

667fa6c600741aee889006c3 image1

In conclusion, Traceable empowers safety groups to proactively assess and repair safety points in APIs to determine risk exercise. With intensive safety context, risk intel, and broad and deep knowledge assortment and evaluation Traceable delivers an information benefit in defending APIs throughout cloud environments. Wiz offers prospects the power to robotically gather necessary proof when a cloud useful resource might have been compromised. Collectively Traceable and Wiz  present highly effective safety context, prioritization, and remediation capabilities to guard your functions from code to cloud.To unlock the facility of correlated cloud and API safety context with Traceable and Wiz, schedule a demo as we speak.

About Traceable

Traceable is the trade’s main API Safety firm serving to organizations obtain API safety in a cloud-first, API-driven world. Traceable is the one contextually-informed resolution that powers full API safety – API discovery and posture administration, API safety testing, assault detection and risk searching, and assault safety anyplace your APIs reside. Traceable allows organizations to reduce danger and maximize the worth that APIs deliver to their prospects. To be taught extra about how API safety may also help your small business, go to https://www.traceable.ai/.

Recent articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

î ‚Jan 17, 2025î „Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...